welcome to Cross-Tech Ltd
Welcome to our web site
Computer Support Services
Cross-Tech PC support.
Computer Repairs
The computer has become so entrenched into our modern society that it is used
on a daily basis as a workstation, information and entertainment system without too much thought
given to how it actually does it's magic.
However a computer can be thought of as a box of silicon micro chips powered by electricity, and
can be susceptible to all kinds of weird behaviour.
The computer is a great tool when it is working the way it should however when that expensive box
of silicon chips begins to exhibit strange behaviour or even worse fails to even power on, can be the
source of very very much frustration.
Computer Networking
There are two types of computer networking technologies in popular use today, wired and wireless. In a wired network data travels through a wire cable which is connected at one end to a computer on the network, to the other end of the cable which is connected to a central network hub/switch, the data then travels through the central hub and along other connected wire cables to the final destination networked computer.
Where as in a wireless network data passes through the air as radio waves. Each computer in a wireless network is fitted with a wireless network adaptor, which moves data to and from a central access point which in turn passes the data through the air between other wireless network devices including computers laptops and printers.
Computer Virus
The Morris worm or Internet worm was one of the first computer worms distributed via the Internet; it is considered the first worm and was certainly the first to gain significant mainstream media attention. It also resulted in the first conviction in the USA under the 1986 Computer fraud and Abuse Act. It was written by a student at Cornell University, Robert Tappan Morris, and launched on November 2 1988 from MIT.
Today malicious software is a very sophisticated beast; with some viruses and other unwanted software (including spyware) designed to reinstall themselves after they have been detected and removed.
Data Recovery
Data recovery is the process of salvaging data from damaged, failed, corrupted or
inaccessible secondary storage media when it canot be accessed normally. Often the data is salvaged from storage
media formats such as hard disk drives, storage tapes, CDs, DVDs, camera memory cards and other electronic devices.
Recovery may be required due to physical damage to the storage device or logical damage to the file system
that prevents it from being mounted by the host operating system.
Data cleansing; if you've decided to donate your old computer to a charity, a local group or school, it's important to make sure that the computers hard disk drive is completely free of any personal and sensitive data which could potentially be used to steal your identity amongst other things.
Custom Built Computers
Although the computer systems which can be purchased from the major computer dealers PC World or Dell for example are very capable, up to date and value for money, these computer systems are mass produced and lack any individuality.
Build-to-order Computers, or Custom PC's are systems that are designed and built specifically to suit your needs and wants. As such, every system is unique to the person who orders it. From powerful desktop systems, high-end gaming or video editing systems to reliable network server systems.
Computer Security
Your computer system is a popular target for intruders. Why? Because intruders want what you've stored there. They look for credit card numbers, bank account information, and anything else they can find. By stealing that information, intruders can use your money to buy themselves goods and services or they may sell your information on to third-party criminals.
But it's not just money-related information they're after. Intruders also want your computer's resources, meaning your hard disk space, your fast processor, and your Internet connection. They use these resources to attack other computers on the Internet. In fact, the more computers an intruder uses, the harder it is for law enforcement to figure out where the attack is really coming from. If intruders can't be found, they can't be stopped, and they can't be prosecuted.
tech support
Computer Repairs and Upgrades
We don't just bring computers back to life
...we build in personality.
Cross-Tech Ltd thrive on finding
solutions
to computer problems. It's what we do.
tech support
Wireless and Wired Network
installation repairs upgrades
Want to surf the Internet without wires?
Cross-Tech Ltd can install your router and set up wireless conectivity, ensure that it is secure avoiding the hassle for you and allowing you to enjoy going wireless anywhere in your home.
tech support
Computer Virus and Spyware removal
Free yourself from unsolicited pop-ups.
Cross-Tech Ltd use specially designed tools to remove unwanted malicious software from the computer permanently.
tech support
Data Recovery and Cleansing
Recover those precious family photos.
Cross-Tech Ltd use specially designed tools and techniques to recover lost data and files from computer systems.
tech support
Custom Built computers
You dream it...we build it.
Cross-Tech Ltd will help build a computer system to meet your desires and budget.
tech support
Securing your Computer System
Don't become a victim.
Cross-Tech Ltd will help secure you're computer system using a layered approach to computer security.